Skip to content

Commit

Permalink
Added a question
Browse files Browse the repository at this point in the history
  • Loading branch information
gdanezis committed Mar 21, 2017
1 parent 648a42f commit 85838e6
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 1 deletion.
2 changes: 2 additions & 0 deletions Lab05Credential/Lab05Code.py
Original file line number Diff line number Diff line change
Expand Up @@ -316,3 +316,5 @@ def credential_show_verify_pseudonym(params, issuer_params, pseudonym, tag, proo
# ensuring both integrity (no-double spending) and privacy.
# What would the credential represent, and what statements
# would need to be shown to a verifier.

""" Your answer here. """
6 changes: 5 additions & 1 deletion Lab05Credential/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -105,4 +105,8 @@ The user may verify the issuing was indeed correct. Finally, the user may use th

- Your task is to modify the protocols of task 3 (above) to not only prove possession of a credential when showing it, but also proving that a credential's secret attribute v maps to the pseudonym claimed.

- Feel free to re-use code from Task 3 -- the modification to also support pseudonyms is small. Note that the paper presents proving arbitrary predicates on attributes when Showing as a predicate phi(m_1, ..., m_n). Showing that the attribute v leads to a pseudonym H(.)^v is a simple case of such a predicate.
- Feel free to re-use code from Task 3 -- the modification to also support pseudonyms is small. Note that the paper presents proving arbitrary predicates on attributes when Showing as a predicate phi(m_1, ..., m_n). Showing that the attribute v leads to a pseudonym H(.)^v is a simple case of such a predicate.

## Task Q1 -- e-cash question

- Answer the question in the space provided.

0 comments on commit 85838e6

Please sign in to comment.